index_28
Router Security Configuration Guide
UNCLASSIFIED
28
UNCLASSIFIED
Version 1.0g
2.7. References
2.7.1. Books
[1] Albritton, J. Cisco IOS Essentials, McGraw-Hill, 1999.
An excellent introduction to basic IOS operations, with explanations of many
of the concepts. If you need more introductory information than this section
provides, this book is a good source.
[2] Ballew, S.M., Managing IP Networks with Cisco Routers, OReilly Associates,
1997.
A practical introduction to the concepts and practices for using Cisco routers.
[3] Chappell, L. Introduction to Cisco Router Configuration, Cisco Press, 1998.
A good book for le arning the basics, with an emphasis on Cisco IOS.
[4] Chappell, L. (ed.) Advanced Cisco Router Configuration, Cisco Press, 1999.
For the network administrator who already has basic familiarity with Cisco
IOS, this book provides detailed information about a wide variety of topics
and features.
[5] Perlman, R., Interconnections: Bridges and Routers, McGraw-Hill, 1992.
This book offers good explanations of all the underlying concepts, with no
vendor emphasis.
[6] Sacket, G., Cisco Router Handbook , McGraw-Hill, 1999.
This thick book provides a lot of detail on the architecture of Cisco routers
and their operational concepts.
[7] Held, G. and Hundley, K., Cisco Security Architectures, McGraw-Hill, 1999.
For administrators already comfortable with basic operation of a router, this
book provides concepts and practical advice for using a router securely.
[8] Tannenbaum, A., Computer Networks, 2nd edition, Prentice-Hall, 1998.
A classic, well written, good background reading, an excellent source for
understanding all the concepts behind networks, routers, and TCP/IP.
[9] Stevens, W.R., Unix Network Programming, Prentice-Hall, 1998.
This book is primarily oriented toward network application programmers, but
it also provides a great deal of technical background information.